Run simple Greenbone Vulnerability Assessment on WAN Address
Receive described result
Expected behavior
Have no vulnerabilities
Edit:
It reports that the TLS.1.2 Protocol is affected by these vulnerabilities.
According to RFC 8446, the affected algorithms would be discarded by enforcing TLSv1.3:
https://www.rfc-editor.org/rfc/rfc8446#section-1.2
@overcuriousity These are TLSv1.2 protocol bug and not a Zoraxy bug. Zoraxy use standard Golang library for the implementation. Please report these security finding to the Go issue page instead.
Findings from Security Scan
Results from a simple Greenbone Security Scan run on a WAN Address I control:
[CVE-2016-2183] [CVE-2016-6329] [CVE-2020-12872]
To Reproduce Steps to reproduce the behavior:
Expected behavior Have no vulnerabilities
Edit: It reports that the TLS.1.2 Protocol is affected by these vulnerabilities. According to RFC 8446, the affected algorithms would be discarded by enforcing TLSv1.3: https://www.rfc-editor.org/rfc/rfc8446#section-1.2